Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
Authress Academy Series' Articles
Back to Warren Parad's Series
How to secure a multitenant application architecture
Warren Parad
Warren Parad
Warren Parad
Follow
for
Authress Engineering Blog
Jul 12 '20
How to secure a multitenant application architecture
#
architecture
#
applicationsecurity
#
microservices
#
software
22
reactions
Comments
Add Comment
4 min read
Denylists and Invaliding user access
Warren Parad
Warren Parad
Warren Parad
Follow
for
Authress Engineering Blog
Jul 5 '23
Denylists and Invaliding user access
#
devops
#
api
#
security
#
architecture
12
reactions
Comments
2
comments
11 min read
How does machine to machine authentication work?
Warren Parad
Warren Parad
Warren Parad
Follow
for
Authress Engineering Blog
Dec 6 '23
How does machine to machine authentication work?
#
architecture
#
security
#
backend
#
programming
9
reactions
Comments
Add Comment
11 min read
The Risks of User Impersonation
Warren Parad
Warren Parad
Warren Parad
Follow
for
Authress Engineering Blog
Jan 24 '25
The Risks of User Impersonation
#
authentication
#
authorization
#
identity
#
security
11
reactions
Comments
Add Comment
20 min read
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account